Dunkin Donuts: Monitoring Employees Communication

Improved Essays
(b) In one paragraph identify 1 real organization that you think is efficient an effective and support your answer by giving specific examples.
Dunkin Donuts has undergone a brand transformation over the years with newer stores and updated technology. One that stands out from is their mobile payment application that was introduced in 2012 (Dunkin ' Donuts offers mobile payment app of its own). The app is free for customers to join and encourages customers to pay for coffee, donuts, and merchandise at restaurants. This app enables customers to become part of the Dunkin Donuts family and entices frequent visits by providing weekly specials for both food and drinks. This is the only app that has the ability to send virtual gift cards with a push
…show more content…
(p.57) Read The Wall Street Journal Case In the News. Provide a response to the 3 questions.
1. Under what conditions is it acceptable for a company to monitor its employees’ communication?
The right to employee monitoring produces a sensitive issue of employee vs employers’ privacy rights. If sensitive materials are leaked out from employee a company cannot be competitive in the marketplace. Especially in the form of sensitive information that could be used to harm another person or company. Companies should be diligent in monitoring employees as they are on company time and using the company’s property. While some employees don’t think about the consequences of searching the web during work hours they open up the computer systems to hackers or viruses that can destroy a network in moments (Snail).

2. How would you feel if your employer monitored your communications?
I have had to sign repeatedly an Electronic acknowledgement agreement at most of companies throughout the years. In this agreement it clearly states that as an employee of the company an employee must abide by the rules and conditions set forth in the policy or possibly suspension or termination could occur. Basically if an employee uses the computers for any other use then business they could be reprimanded or terminated pending an

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Biby Case Summary

    • 636 Words
    • 3 Pages

    Held: Court ruled in favor of the university. It cited a university policy that it has the right to search the employees' computers for legitimate reason. In this case, not only was there a policy allowing the un university to search employees email but the search took place within the discovery period for arbitration. This case likewise affirms that the employees have less expectation of privacy in the workplace…

    • 636 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    As the progress of technological innovation marches on, it brings a new layer of complications to the labor relations process. More than ever, the challenge of balancing employee privacy with employer interests presents immense difficulties, especially with regards to social media. The two cases examined in the following pages form a framework for a cursory investigation of workplace privacy and an employer’s interest and legal rights to restrict the digital activities of their employees. In the first case, First Alert Medical Response (First Alert) ambulance service exercised those rights when they fired Betty Nelson over social media postings (Holley, Jennings, & Wolters, 2012). A recent Idaho Supreme Court decision supports First Alert’s actions.…

    • 1334 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Will Doolittle was a financial analyst at the corporate headquarters of Home Décor in Atlanta, Georgia. He was terminated for violating provision of the employee handbook. His violation included sending email to friends of a sexual nature and the use of Internet to play slot machine and other games. Doolittle believes his employer violated his right by monitoring his personal email and Internet use. Employer authority to check email and Internet use has grown in the present time.…

    • 1444 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Visiting websites that are dangerous. If any one of the employees are caught doing these things, not only it will hurt the person that is doing it, but the people around them. That means they will be fired. Accountability…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In this case we are faced with an employee caught in the crossfire or an employee setting boundaries to protect employees, students and other involved, but also violates those same groups right to privacy. Under most circumstances, those employed by the city, state or federal government are subjected to limited privacy. Organization are often uncertain were to draw the line between protecting the company’s assets and employees while providing a safe and secure work and school environment. In this case we discuss an employer who installs a surveillance camera to solve the problem of continuous theft of student’s personal good.…

    • 612 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Hrm/300 Week 2

    • 1986 Words
    • 8 Pages

    An organization should only collect personal information and other information that is necessary, and should not divulge or release any of this information without permission from the employee. Lastly, this information should be used for the sole purpose for which it was collected and employees…

    • 1986 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    The expectation of privacy has been found by courts to be a thin line when employees utilize an employer's equipment.…

    • 96 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The 14th Amendment Essay

    • 932 Words
    • 4 Pages

    Technological changes have created a more complex phenomenon in the area of employee’s surveillance. Various technologies have made it easy for the employers to monitor their employee’s jobs especially through internet, emails, computer terminals, and telephone. Almost everything perfumed by the…

    • 932 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Starbucks Case Study

    • 2837 Words
    • 12 Pages

    Its partnership with Apple to bring app based discount coupons is helping it ride the mobile wave easily. The company introduced Wi-Fi capabilities in its outlets already. Internet is important to the consumers. They can now surf the web and do work while sipping Starbucks coffee.…

    • 2837 Words
    • 12 Pages
    Great Essays
  • Improved Essays

    1. What are the two types of white-collar crimes? The two types of white-collar crimes are occupational and corporate.…

    • 851 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A customer life cycle normally used to manage and maintain the relationship of the customer with the company. This relationship is between two people, there are three stages in the customer lifecycle with different phases of activity. The first stage is customer acquisition. The process of customer acquisition refers to acquiring new customers to the company. In the words, this is a strategy using by the company to gaining new customers include persuade customers to buy the products and services from the company.…

    • 1002 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Describe the difference between efficiency and effectiveness and identify real organizations you think are, or are not, efficient and/or effective. Efficiency is an indicator of productivity for the company. The concept measured how well a company uses its resources to accomplish a goal. Efficiency is associated with the capacity of the company to optimize the use of its resources. Efficiency reduces production cost and time invested in produce a good or service.…

    • 1438 Words
    • 6 Pages
    Improved Essays